Sciweavers

13553 search results - page 2541 / 2711
» A Generalized Multi-View Approach
Sort
View
135
Voted
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 9 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
125
Voted
INFOVIS
2003
IEEE
15 years 9 months ago
Constant Density Displays Using Diversity Sampling
The Informedia Digital Video Library user interface summarizes query results with a collage of representative keyframes. We present a user study in which keyframe occlusion caused...
Mark Derthick, Michael G. Christel, Alexander G. H...
153
Voted
ISCC
2003
IEEE
15 years 9 months ago
Fair Noiseless Broadcast Source Coding
We present a noiseless source coding problem in a broadcast environment and supply a simple solution to this problem. A transmitter wishes to transmit a binary random vector Ò ½...
Serdar Boztas
121
Voted
ITC
2003
IEEE
157views Hardware» more  ITC 2003»
15 years 9 months ago
Parity-Based Concurrent Error Detection in Symmetric Block Ciphers
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption. We will describe a general concurren...
Ramesh Karri, Grigori Kuznetsov, Michael Göss...
146
Voted
MEMOCODE
2003
IEEE
15 years 9 months ago
LOTOS Code Generation for Model Checking of STBus Based SoC: the STBus interconnect
In the design process of SoC (System on Chip), validation is one of the most critical and costly activity. The main problem for industrial companies like STMicroelectronics, stand...
Pierre Wodey, Geoffrey Camarroque, Fabrice Baray, ...
« Prev « First page 2541 / 2711 Last » Next »